3.3 Security Best Practices
Key Management
Generate a new key pair for your validator:
Securely store your private key. Never share it or store it in plain text on your server.
Use hardware security modules (HSMs) for additional security if available.
Node Security
Keep your operating system and all software up to date.
Use a firewall to restrict incoming connections:
Disable root SSH access and use key-based authentication.
Network Security
Use a VPN or private network for communication between your nodes if running multiple.
Implement DDoS protection if your node is publicly accessible.
Regularly monitor your node for unusual activity or performance issues.
Last updated